AI-powered AWS security log anomaly detector. Ingests CloudTrail/VPC Flow Logs, extracts entities using NLP, scores anomalies, and provides compliance automation. Built with Python 3.11, Poetry, CDK, VPC-only deployment, KMS encryption, and comprehensive testing.
Stars
0
Forks
0
Watchers
0
Open Issues
0
Overall repository health assessment
No package.json found
This might not be a Node.js project
Skip virtualenv directories (.venv, venv, env and folders containing pyvenv.cfg) in scan_secrets.py
9d8dbb7View on GitHubAdd portable scan_secrets.py, pre-commit and CI secret-scan workflow
ce4c704View on GitHubAdd pre-commit config and CI secret scan workflow (detect-secrets)
14bbcd1View on GitHubHarden permission boundary and add scoped test\n\nScope the managed permission boundary to the stack's S3 object ARNs, KMS key ARN and SNS topic ARN and attach it to the detector role via CfnRole override. Add a unit test that asserts the boundary is scoped (to tokens/ARNs, not '*').
c1f5b11View on GitHubcdk: wire alarm actions to SNS alerts topic; add test asserting alarm actions; update checklist
2914d22View on GitHubcdk: add error MetricFilter and CloudWatch Alarm; update checklist
016b329View on GitHubs3: add multipart-config S3Adapter, config-driven transfer; strict KMS; pydantic v2 fixes
dff1a26View on GitHub15
commits